Method for defending against session hijacking attacks and firewall
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0055]The disclosure is illustrated by way of example and not by way of limitation in the figures of the accompanying drawings in which like references indicate similar elements. It should be noted that references to “an” or “one” embodiment is this disclosure are not necessarily to the same embodiment, and such references mean at least one.
[0056]Referring to FIG. 1, which is a flow chart of a method for defending against session hijacking attacks in accordance with a first embodiment of the present disclosure. The method provided in the embodiment includes the following steps.
[0057]Step S10, receiving a first access request transmitted from a legal client side and further transmitting the first access request to a server.
[0058]When the legal client side accesses the server for the first time, an access request (that is, the first access request in the step S10) transmitted from the legal client side does not include a token, at this time, a firewall directly releases the access req...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



